Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

security phishing hook

The Upload: Your tech news briefing for Tuesday, July 28

Samsung's bigger Galaxy S6 likely in August...Most Android phones can be hacked via an MMS...Leading researchers want autonomous weapons ban


Brinks safe can be hacked with just a USB stick

Researchers popped open a safe with 100 lines of macro code

Over 10 million Web surfers possibly exposed to malvertising

The online advertising company that distributed the ads is taking action to stop it

NSA will lose access to 'historical' phone surveillence data Nov. 29

After Nov. 29, data requests must be made on an as-needed basis to the FISA Court

Gun laser sight

Security researchers take aim at Roku streaming media players

One security researcher cracked Roku WPA2-PSK and the Roku WPS pin, while another used Shodan to uncover some interesting facts about Roku.

Most Android phones can be hacked with a simple MMS message or multimedia file

Vulnerabilities in the Android multimedia framework allow attackers to remotely compromise devices with ease, a researcher said

Smartwatches

All smartwatches have security flaws

In a recent security assessment of ten smartwatches and their iOS and Android companion applications, every single watch had at least one significant security flaw, according to a new report from HP Fortify

emv chip

Predicting winners and losers in the EMV rollout

On October 1, the liability for credit card fraud shifts from card issuers to the retailers that haven’t transitioned to accept cards that use the new EMV technology. Some groups will be more ready than others.

The Upload: Your tech news briefing for Monday, July 27

Facebook prevails in IPO lawsuit... Jeep hack prompts recall of 1.4 million vehicles... Kill switch isn't killing phone theft

Chinese police shut down supplier of over 40,000 fake iPhones

The supplier was allegedly shipping the fake iPhones to foreign countries

US Census Bureau says breach didn't expose household data

The breached database was segregated from systems that hold census data

connected home illustration internet of things IoT

Security holes in the 3 most popular smart home hubs and Honeywell Tuxedo Touch

Security researcher found zero-day holes in SmartThings hubs, Wink hubs and MiOS Vera that could 'lead to unlocked doors and unsolicited access into a person’s home network.' Another IoT warning was issued by CERT, warning users to...

Cisco CEO Chuck Robbins

EARLY ACCESS Q&A: New Cisco CEO Chuck Robbins heads into “hyper-connected” mode

When Cisco Systems employees head into work Monday they’ll encounter something they haven’t seen in two decades: A new boss. Chuck Robbins – formerly senior vice president of worldwide operations – takes over from John Chambers, one...

parallels logo

Managing Apple Macs and Windows Systems with the Same SCCM Tool

Parallels releases latest in add-ons to Microsoft's System Center Configuration Manager to better manage Apple Macs in an integrated Windows environment.

Hillary Clinton sent classified information via personal email

Investigation into email controversy finds problems, reports The Wall Street Journal

US govt guide aims to bolster security of mobile devices used in health care

The guide looked at what security risks pose the greatest danger to keeping patient data private

Wikimedia (CC)

DDoS attack size is getting bigger, security firm says

The percentage of attacks over 1 gigabit per second is 'growing strongly,' according to Arbor Networks. And SSDP attacks that could affect Internet of Things appear to be waning.

Chrysler recalls 1.4M cars that were vulnerable to remote hacking

Voluntary step comes after report showed hackers disabling a Jeep on a busy interstate

Even without breaches, don't count on websites to hide that you have an account with them

Online dating websites Adult Friend Finder and Ashley Madison were exposed to account enumeration attacks, researcher finds

Load More